CVE-2025-62618
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-10
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| elog_project | elog | to 3.1.5-20251014 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-836 | The product records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-62618 is a stored cross-site scripting (XSS) vulnerability in the Electronic Logbook (ELOG) software. Authenticated users can upload arbitrary HTML files that are executed in the context of other users when they open these files. This allows attackers to steal usernames and password hashes included in certain HTTP requests, which can then be used to replay credentials or crack passwords offline. The vulnerability is fixed in ELOG version 3.1.5-20251014 by rendering uploaded HTML files as plain text, preventing script execution. [3]
How can this vulnerability impact me? :
This vulnerability can lead to credential theft by allowing attackers to execute malicious HTML/JavaScript in other users' browsers. Attackers can capture usernames and password hashes, potentially gaining unauthorized access to user accounts through replay attacks or offline password cracking. This compromises confidentiality, integrity, and availability of the system and user data. [3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring for uploaded HTML files in ELOG by authenticated users, as these files may contain malicious scripts. Additionally, inspecting HTTP requests for usernames and password hashes being transmitted can indicate exploitation attempts. Specific commands are not provided in the resources, but checking ELOG upload directories for HTML files and analyzing HTTP traffic for suspicious requests related to ELOG would be advisable. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading ELOG to version 3.1.5-20251014 or later, where uploaded HTML files are rendered as plain text, preventing script execution. Additionally, it is advised not to run ELOG with self-registration or the execute facility enabled to reduce risk. [3]